Watchguard XTMv Installation guide

Category
Networking
Type
Installation guide
WatchGuard XTMv
Setup Guide
Fireware XTM v11.8.1
All XTMv Editions
ii WatchGuard XTMv
ADDRESS
505 Fifth Avenue South
Suite 500
Seattle, WA 98104
SUPPORT
www.watchguard.com/support
U.S. and Canada +877.232.3531
All Other Countries +1.206.521.3575
SALES
U.S. and Canada +1.800.734.9905
All Other Countries +1.206.613.0895
ABOUT WATCHGUARD
WatchGuard offers affordable, all-in-one network and content security solutions that
provide defense-in-depth and help meet regulatory compliance requirements. The
WatchGuard XTM line combines firewall, VPN, GAV, IPS, spam blocking and URL
filtering to protect your network from spam, viruses, malware, and intrusions. The new
XCS line offers email and web content security combined with data loss prevention.
WatchGuard extensible solutions scale to offer right-sized security ranging from small
businesses to enterprises with 10,000+ employees. WatchGuard builds simple, reliable,
and robust security appliances featuring fast implementation and comprehensive
management and reporting tools. Enterprises throughout the world rely on our
signature red boxes to maximize security without sacrificing efficiency and
productivity.
For more information, please call 206.613.6600 or visit www.watchguard.com
.
Copyright and Patent Information
Copyright© 1998–2014 WatchGuard Technologies, Inc. All rights reserved.
WatchGuard, the WatchGuard logo, LiveSecurity, and any other mark listed as a trademark in the “Terms of Use” portion of
the WatchGuard Web site that is used herein are either registered trademarks or trademarks of WatchGuard Technologies,
Inc. and/or its subsidiaries in the United States and/or other countries. All other trademarks are the property of their
respective owners.
Printed in the United States of America.
Revised: January 21, 2014
U.S. Patent Nos. 6,493,752; 6,597,661; D473,879. Other Patents Pending.
Notice to Users
Information in this guide is subject to change without notice. Updates to this guide are posted at:
http://www.watchguard.com/help/documentation/xtmv.asp
Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this guide may be
reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express
written permission of WatchGuard Technologies, Inc.
Complete copyright, trademark, patent, and licensing information can be
found in the WatchGuard product documentation. You can find this
document online at:
http://www.watchguard.com/help/documentation/
XTMv Setup Guide 1
XTMv Introduction
WatchGuard® XTM security devices deliver unparalleled unified threat management, superior performance,
ease of use, and value for your growing network. Our security subscriptions give you fully integrated
protection from spyware, spam, viruses, worms, trojans, web-based exploits, and blended threats. From
firewall and VPN protection to secure remote access, WatchGuard devices support a broad range of network
environments.
This guide describes how to set up a WatchGuard XTMv security device as a virtual machine on aVMware ESXi
host or Microsoft Hyper-V hypervisor environment.
Fireware XTM
WatchGuard XTMv uses the Fireware® XTM OS. Each XTMv virtual machine includes Fireware XTM and delivers
exceptional protection against today's sophisticated threats, to make sure that your business stays connected.
For more information about the features of Fireware XTM OS, see the Fireware XTM WatchGuard System
Manager Help or Fireware XTM Web UI Help.
2 WatchGuard XTMv
WatchGuard XTMv
WatchGuard XTMv
A WatchGuard XTMv virtual machine can run on a VMware ESXi 4.1, 5.0, or 5.1 host, or on a Windows Server
2008 R2, Windows Server 2012, Hyper-V Server 2008 R2, or Hyper-V Server 2012.
You can use WatchGuard System Manager, Fireware XTM Web UI, and the Command Line Interface (CLI) to
manage an XTMv virtual machine, just as you manage any other WatchGuard XTM device.
XTMv Limitations
XTMv supports most features available in Fireware XTM OS, with the exception of a few features that are
hardware-dependent.
Fireware XTM features not supported on XTMv include:
Active/active FireCluster in VMware ESXi environment (FireCluster is not supported for Hyper-V)
Bridge mode network configuration
Hardware diagnostics CLIcommands
Automatically save a support snapshot to a USB drive
Automatically restore a saved backup image from a USB drive
To work correctly, some Fireware XTM networking features require that you configure the virtual switch on
your network in promiscuous mode. Because Hyper-V virtual switches do not support promiscuous mode,
these features are not supported for XTMv in a Hyper-V environment:
Drop-in mode network configuration
Network bridge
Mobile VPN with SSL, with the Bridged VPN Traffic setting
XTMv supports the features that require promiscuous mode only when deployed on a VMware ESXi server,
with promiscuous mode enabled on the connected virtual network adapters.
To use multiple VLANs on a single interface on an XTMv device in an ESXi environment, configure the vSwitch
for the XTMv VLAN interface to use VLANID4095 (All).
To configure an active/passive FireCluster in an ESXi environment, you must enable promiscuous mode on the
vSwitch interface that connects to the FireCluster management interface. We recommend that you enable
promiscuous mode on any vSwitch that connects to any FireCluster interface to enable the cluster to support
all networking features.
XTMv Licensing
XTMv devices are licensed in several different editions, which provide different levels of scalability and
performance:
Small Office Edition
Medium Office Edition
Large Office Edition
Datacenter Edition
When you activate your XTMv device, a feature key is generated. The feature key enables the Fireware XTM
capabilities for the XTMv edition you have licensed. The feature key is installed on the XTMv virtual machine
during setup. You can also use a feature key to upgrade from one XTMv edition to another.
For a full description of the features and capabilities of each XTMv edition, see the Products & Services
section of the WatchGuard web site at www.watchguard.com.
Setup Guide 3
XTMv Installation Overview
XTMv Installation Overview
The installation prerequisites and steps to deploy an XTMv virtual machine depend on which hypervisor
environment you select.
Before you begin, download the XTMv .ovf template file or .vhd virtual hard disk file, and the WatchGuard
System Manager software from the Articles and Software section of the WatchGuard Portal.
VMware ESXi
For XTMv on ESXi, WatchGuard distributes XTMv as a WatchGuard XTMv virtual appliance Open Virtual
Machine Format (.ovf) file.
To deploy an XTMv virtual appliance on an ESXi host:
1. Use the VMware vSphere Client to deploy the XTMv virtual appliance to an ESXi host.
2. Power on the XTMv virtual machine.
3. Connect to the XTMv virtual machine and use the Web Setup Wizard to set up a basic configuration.
4. Allocate additional resources to the XTMv virtual machine.
For complete instructions, see “XTMv Setup on VMware ESXi” on page 5.
You can also configure two ESXi virtual machines as a FireCluster on ESXi.
Microsoft Hyper-V
For XTMv on Hyper-V, WatchGuard distributes XTMv as a WatchGuard XTMv virtual hard disk (.vhd) file.
To deploy an XTMv virtual hard disk in a Hyper-V environment:
1. Use Hyper-V Manager or System Center VMM to deploy the XTMv virtual machine and select the .vhd
file to use.
2. Assign network adapters, and power on the XTMv virtual machine.
3. Connect to the XTMv virtual machine and run the Web Setup Wizard to set up a basic configuration.
4. Allocate additional resources to the XTMv virtual machine.
For complete instructions, see “XTMv Setup on Microsoft Hyper-V” on page 23.
WatchGuard Setup Wizards
This guide describes how to use the Fireware XTM Web Setup Wizard to create the initial configuration on a
deployed XTMv virtual machine. To run the Web Setup Wizard, you can connect to the XTMv virtual machine
from a computer on either the external or trusted network.
If you have installed WatchGuard System Manager on a computer on the XTMv device trusted network, you
can use the Quick Setup Wizard in WatchGuard System Manager instead of the Web Setup Wizard to discover
the XTMv virtual machine and set up the basic device configuration.
4 WatchGuard XTMv
XTMv Installation Overview
XTMv Setup Guide 5
XTMv Setup on VMware ESXi
This section describes how to deploy and configure a WatchGuard XTMv virtual machine on a VMware
vSphere ESXi host.
Installation Prerequisites
The environment where you install the XTMv virtual device must meet these requirements:
VMware
o You must have a VMware vSphere Hypervisor/ESXi 4.1 Update 2 (or later) or ESXi 5.0 or 5.1 host
installed on a server that supports your ESXi version.
o Your VMware vSphere/ESXi software must be updated to the latest patch level.
o You must install the VMware vSphere Client on a supported Windows computer.
In the procedures in this document, we use the vSphere Client to deploy, configure, and
provision the XTMv virtual machine on an ESXi 5.1 host. You can use vCenter Server instead of
the vSphere Client.
Note
Some WatchGuard customers have successfully used vMotion to migrate an XTMv virtual machine
between ESXi hosts while the XTMv virtual machine is powered on and passing traffic. However we
recommend that you power down the XTMv virtual machine, if possible, before you migrate it
between ESXi hosts.
Hardware
o The hardware requirements for XTMv are the same as the hardware requirements for VMware
ESXi.
For information about VMware hardware compatibility, see the VMware Compatibility Guide
at http://www.vmware.com/resources/compatibility/search.php
.
o Each XTMv virtual machine requires 3 GB of disk space.
6 WatchGuard XTMv
XTMv Installation
XTMv Installation
Before You Begin
To prepare for your installation, make sure you have these things:
VMware ESXi 4.1 Update 2, 5.0, or 5.1 host installed on a supported server platform
VMware vSphere Client installed on a Windows computer
XTMv device serial number
You receive the serial number when you purchase the XTMv virtual device.
WatchGuard XTMv virtual appliance Open Virtual Machine Format (OVF) file
The file name is xtmv_<version>.ova, where <version> is the Fireware XTM version.
(optional) WatchGuard System Manager v11.7.3 or higher (WatchGuard System Manager v11.8.1 or
higher is required to configure FireCluster)
Download the
XTMv.ovf template file and the WatchGuard System Manager software from the Articles and
Software section of the WatchGuard Portal.
Installation Overview
To complete the initial installation of your XTMv virtual machine, perform these procedures as described in
the subsequent sections:
1. In the VMware vSphere Client, deploy the XTMv virtual appliance to the ESXi host and power on the
XTMv virtual machine.
2. Connect to the XTMv virtual machine and run the Web Setup Wizard to set up a basic configuration.
3. Allocate additional resources to the XTMv virtual machine.
This guide describes how to use the Web Setup Wizard to create an initial configuration for your XTMv device.
If you have installed WatchGuard System Manager on a computer on the XTMv device trusted network, you
can use the Quick Setup Wizard in WatchGuard System Manager instead of the Web Setup Wizard to discover
the XTMv virtual machine and set up the basic device configuration.
Note
To activate your XTMv device from the Web Setup Wizard, you must have the device serial number.
You cannot use a serial number that ends with 000000000, which is the serial number for an
unactivated device.
Setup Guide 7
XTMv Installation
Network Considerations
When you deploy the XTMv virtual appliance, it is initially configured with two active interfaces.
External interface
The external interface, Interface 0, is set up by default to request an IP address from a DHCP server. If
you want to connect to this interface for the initial device configuration, you must map this interface
to a destination network that has a DHCP server.
Trusted interface
The trusted interface, Interface 1, has a default IP address of 10.0.1.1.
When you deploy the XTMv virtual appliance to the ESXi device, you map each of these interfaces to a
destination network.
After you deploy the XTMv virtual machine, you can enable and configure additional XTMv device network
interfaces. For additional interfaces to operate, you must configure the XTMv virtual machine in the vSphere
Client or vCenter Server, and add the number of network adapters you want to enable in the XTMv device
configuration.
Deploy the XTMv Virtual Appliance
You can use the vSphere Client to connect to an ESXi host or vCenter Server to deploy the XTMv virtual
appliance (OVF template file).
To use the vSphere Client connected to an ESXi host:
1. Launch the vSphere Client and log in to the ESXi host with administrator credentials.
2. In the vSphere client, select File > Deploy OVF Template.
8 WatchGuard XTMv
XTMv Installation
3. Browse to the location where you saved the WatchGuard XTMv OVF template file,
xtmv_<version>.ova. Click Next.
The XTMv OVF Template Details page appears.
4. Click Next.
The End User License Agreement appears.
5. Review the End-User License Agreement. Click Accept. Click Next.
The Name and Location page appears.
6. In the Name text box, type a name for this virtual device. Click Next.
7. If your ESXi host has more than one resource pool, select the resource pool for this template.
If you selected a resource pool in the vSphere Client inventory tree before you started to deploy the OVF template,
you do not see this step.
8. Click Next.
The Disk Format page appears.
9. Select the storage format for the virtual disks.
We recommend that you select one of the Thick provision formats to allocate all storage immediately.
Setup Guide 9
XTMv Installation
10. Click Next.
The Network Mapping page appears.
11. In the Destination Networks column, select the networks to map to Network 0 (eth0: External) and
Network 1 (eth1: Trusted).
12. Click Next.
The Ready to Complete page appears.
13. Review the settings. Click Back to change any settings, if necessary.
14. Click Finish to deploy the template.
The virtual machine is created. This can take a few minutes.
10 WatchGuard XTMv
XTMv Installation
The deployed XTMv virtual machine appears in the vSphere Inventory.
If there are additional resources that you want to allocate to this virtual machine, you can allocate those
resources now, before you power on the virtual machine. Or, you can add resources later. You do not have to
allocate additional resources to create a basic Fireware XTM configuration. For more information about how
to allocate additional resources, see “ESXi Resource Allocation” on page 15.
Setup Guide 11
XTMv Installation
Power On the XTMv Virtual Machine
Next, you power on the XTMv virtual machine. When you initially power it on, the XTMv virtual machine
automatically sends a DHCP broadcast to request an IP address for the external interface. If a DHCP server is
configured on the external network, the XTMv external interface receives an IP address.
To power on the XTMv virtual machine:
1. In the vSphere Client Inventory tree, select the virtual device.
2. Select the Summary tab.
3. In the Commands section, select Power on.
The XTMv virtual machine is powered on with factory default settings.
4. After the virtual machine is powered on, and if a DHCP server exists on the XTMv external network, the
IP Addresses setting shows the IP address assigned to Interface 0. If an address is not assigned to the
XTMv external network, the IP Addresses setting shows the default IP address for Interface 1, 10.0.1.1.
5. Click View all to see all assigned IP addresses.
XTMv Device Factory Default Settings
When you power on the XTMv virtual machine for the first time, the XTMv device starts with these factory
default settings:
The XTMv device has two active interfaces: external and trusted.
The trusted interface has the IP address 10.0.1.1.
The external interface is configured to receive an IP address through DHCP.
The trusted interface is not configured to assign IP addresses with DHCP.
This is different than the default setting for other XTM devices.
Both the trusted and external interfaces accept management connections.
This is different than the default setting for other XTM devices.
The admin account passphrase is readwrite.
The serial number for an unactivated XTMv device ends with 000000000.
You assign the actual serial number during device activation.
12 WatchGuard XTMv
XTMv Installation
Use the Web Setup Wizard to Create a Basic Configuration
The Fireware XTM Web Setup Wizard is almost the same for an XTMv virtual machine as it is for any other
WatchGuard XTM device. One difference is that, for an XTMv virtual machine, you can connect to either the
trusted interface or the external interface to run the Web Setup Wizard. If the external interface has been
assigned an IP address, you can use that interface to connect to Fireware XTM Web UI and run the Web Setup
Wizard.
Note
If you do not complete the Web Setup Wizard within 15 minutes, the wizard does not save any of your
settings. You must log in and start the wizard again.
The Web Setup Wizard includes a step to activate your XTMv device. At this step, you can choose from one of
three activation options:
Online Activation
With Online Activation, the wizard activates your XTMv device and downloads the feature key to
enable all the functionality for your XTMv device. If you have the device serial number, and the XTMv
virtual machine has an Internet connection on the external interface, you can use online activation to
allow the wizard to activate the device and automatically download a feature key.
Manual Activation
If you have already activated the XTMv device on the WatchGuard web site, and you have saved the
feature key to a local file, you can select the Manual Activation option and paste the feature key into
the wizard.
Skip Activation
f you do not have the serial number or feature key, you can choose the Skip Activation option and
finish the wizard. This saves your other configuration settings and allows you to complete the wizard.
If you skip activation, you must add the feature key later in Fireware XTM Web UI or WatchGuard
System Manager. Your device does not have full functionality until it has the feature key to enable the
purchased feature set.
To set up the basic configuration file on an XTMv virtual machine:
1. Open a web browser and connect to Fireware XTM Web UI on either the external or trusted interface.
Connect to the external interface — From any computer on the XTMv external network, connect
to:
https://<External_IP_Address>:8080
For <External_IP_Address>, use the IP address you found in Step 4 of the previous procedure.
Connect to the trusted interface — From any computer on the XTMv trusted network, connect
to:
https://10.0.1.1:8080
2. Log in to Fireware XTM Web UI with the default administrator account credentials.
Username
admin
Passphrasereadwrite
3. Click Next.
The Web Setup Wizard Welcome page appears.
4. Select Create a new device configuration (the default option). Click Next.
The license agreement appears.
5. Read the license agreement. You must accept the license agreement to continue. Click Next.
The external interface configuration page appears.
6. Select the method to use to assign your XTMv device an external IP address:
DHCP — To use DHCP to assign the IP address, select this option. This is the default.
PPPoE — To use PPPoE to assign the IP address, select this option.
Static — To assign a static IP address, select this option.
Setup Guide 13
XTMv Installation
7. Click Next.
8. If you selected DHCP, select Obtain an IP automatically, or Use IP address and type the IP address for
the interface.
If you selected PPPoE:
Select Obtain an IP automatically, or select Use IP address and type an IP address for the
interface.
Type the PPPoE User Name and Password.
If you selected Static, type the IP address for the external interface and type the IP address of the
gateway.
9. Click Next.
The Configure the DNS and WINS Servers page appears.
10. Type the Domain Name and the addresses of the DNS Servers and WINS Servers for the XTMv device
to use. Click Next.
The trusted interface configuration page appears.
11. Select an option for the trusted interface:
IP Address — Type the IP address to use for the trusted network interface (interface 1).
DHCP Server — Enables the DHCP server for the trusted interface. In the From and To text boxes,
type the range of addresses the DHCP server can assign.
When you select this option, the XTMv device is the DHCP server for devices that connect to the virtual network
for the trusted interface. Do not enable the DHCP server on this interface if a DHCP server is already configured
on the same network.
12. Click Next.
13. Type a passphrase for the status (read only) and admin (read/write) accounts on the XTMv device.
Click Next.
14. Type the Device Name (required), Device Location (optional), and Contact Person (optional) for this
XTMv device. Click Next.
15. Select the Time Zone where the XTMv device is located. Click Next.
The Online Activation page appears.
16. Select an activation option:
If you have the serial number, but not the feature key, select Use Online Activation and provide
this information:
o Device Name — A name to identify this device in your account on the WatchGuard web site.
o Serial Number — The XTMv serial number you received when you purchased the device —
this is different from the default serial number that ends with 000000000, which is the serial
number for an unactivated device.
o User Name — The user name you use to log in to the WatchGuard web site.
o Password — The password you use to log in to the WatchGuard web site.
If you already have the feature key, select Skip Online Activation and select Add the feature key.
Copy and paste the text from the local feature key file in the text box.
If you do not have the serial number or feature key, select Skip activation and select Skip this
step.
17. Click Next.
The Summary page appears.
18. Review your settings. Click Next to apply the settings.
The Setup is Complete page appears.
14 WatchGuard XTMv
XTMv Installation
After the Setup Wizard Finishes
After you complete the Web Setup Wizard, the XTMv virtual machine is configured with a basic configuration
that allows outbound TCP, UDP, and ping traffic, and blocks all unrequested external traffic, except
management connections.
For an XTMv virtual machine, the default WatchGuard and WatchGuard Web UI policies allow management
connections from any computer on the trusted, optional, or external networks. This is different from the
default configuration for other WatchGuard devices, which do not allow management connections from the
external network. If you do not want to allow management connections from the external network, edit these
policies to remove the Any-External alias from the From list. To allow management from only a specific
computer on the external network, you can add the address of that management computer to the From list
in these policies.
You can use Fireware XTM Web UI, WatchGuard System Manager, or the Fireware XTM Command Line
Interface (CLI) to change the configuration for your XTMv virtual machine. You can connect to either the
trusted or external interface from any computer on the same network.
If you changed the IP address of the interface you used to connect to the Fireware XTM Web Setup Wizard, you
must use the new address to connect and manage the device.
Fireware XTM Web UI
To connect to your XTMv virtual machine with Fireware XTM Web UI:
1. Open a web browser and type
https://<interface_ip_address>:8080.
The Fireware XTM Web UI login page appears.
2. From the User Name drop-down list, select admin.
3. In the Passphrase text box, type the admin passphrase you configured in the wizard.
4. Click Login.
For more information about how to manage your XTMv device with Fireware XTM Web UI, see the Fireware
XTM Web UI Help at http://www.watchguard.com/help/documentation/
.
WatchGuard System Manager
To manage your XTMv device with WatchGuard System Manager, you must install the WatchGuard System
Manager software on a Windows computer located on the XTMv external, trusted, or optional network.
To connect to your XTMv virtual machine with WatchGuard System Manager:
1. In WatchGuard System Manager, select File > Connect to Device.
The Connect to Firebox dialog box appears.
2. In the Name / IP Address text box, type the IP address of the XTMv interface you want to connect to.
3. Type the status passphrase you configured in the wizard.
4. Click Login.
For information about how to install WatchGuard System Manager and manage an XTM device with
WatchGuard System Manager, see the Fireware XTM WSM Help at
http://www.watchguard.com/help/documentation/
.
Setup Guide 15
ESXi Resource Allocation
Fireware XTM Command Line Interface (CLI)
You can manage your XTMv virtual machine with the Fireware XTM CLI from the console in the vSphere Client,
or you can connect through a serial port.
To use the CLI through a serial port, you must allocate a serial port to the XTMv virtual machine. You can use
a physical serial port or connect over a network.
To use the CLI in the console:
1. In the vSphere Client Inventory tree, select the virtual device.
2. Select the Summary tab.
3. Click Open Console.
4. Log in with the admin or status account credentials and the passphrase you configured in the wizard.
For information about how to use the CLI to manage Fireware XTM, see the Command Line Interface Reference
on the XTM Documentation page at http://www.watchguard.com/help/documentation/
.
Reset an XTMv Virtual Machine to Factory Default Settings
If you want to run the Web Setup Wizard again for an XTMv virtual machine, you can use the Fireware XTM CLI
to reset the virtual machine to factory default settings.
To reset the XTMv virtual machine to factory default settings:
1. Log in to the CLI with the admin account.
2. Run the command
restore factory-default.
ESXi Resource Allocation
To achieve the expected performance and scalability for your XTMv edition, we recommend that you allocate
these resources to the XTMv virtual machine:
You can also allocate additional network adapters, up to a total of 10, that correspond to interfaces 0–9 in the
Fireware XTM configuration.
Add Network Adapters
When you deployed the XTMv virtual appliance, you selected two networks to map to the default external and
trusted XTMv network interfaces. To enable other network interfaces in the Fireware XTM network
configuration, you must add network adapters to the XTMv virtual machine. All XTMv editions support a
maximum of 10 network adapters.
To add a network adapter:
1. Launch the vSphere Client and log in to the ESXi host with administrator credentials.
2. In the vSphere Inventory tree, right-click the virtual machine and select Power > Power Off.
3. Right-click the virtual machine, select Edit Settings.
Small Office
Edition
Medium Office
Edition
Large Office
Edition
Datacenter
Edition
Virtual CPUs 1248 or more
Memory 1 GB 2 GB 4 GB 4 GB or more
16 WatchGuard XTMv
ESXi Resource Allocation
4. On the Hardware tab, click Add.
5. Select Ethernet Adapter as the type of device to add. Click Next.
6. From the Type drop-down list, select the type of virtual network adapter to use. The recommended
type, Flexible, is selected by default.
7. From the Network label drop-down list, select the name of the virtual network to add. Click Next.
8. Review the selected options. Click Finish.
To add another network adapter, repeat these steps. You can add amaximum of 10 network adapters.
Configure the Virtual Switch
To work correctly, these Fireware XTM networking features require that you configure the virtual switch
(vSwitch) on your network in promiscuous mode:
Bridge mode network configuration
Network/LAN bridge
Mobile VPN with SSL with the Routed VPN Traffic setting
FireCluster management interface
In the vSphere Client, you configure promiscuous mode in the vSwitch security properties.
To use multiple VLANs on a single interface on an XTMv device in an ESXi environment, configure the vSwitch
for the XTMv VLAN interface to use VLANID4095 (All).
vSwitch Configuration for FireCluster
To configure an active/passive FireCluster in an ESXi environment, you must enable promiscuous mode on the
vSwitch that connects to the FireCluster management interface.
You must configure the vSwitch that connects to a FireCluster external interface to accept MAC address
changes.
Configure Virtual Processors
By default, the XTMv virtual machine is allocated one virtual CPU. For optimal performance, configure the
virtual machine to use the recommended number of CPUs for your XTMv edition.
To configure CPU resources:
1. Launch the vSphere Client and log in to the ESXi host with administrator credentials.
2. In the vSphere Inventory tree, right-click the virtual machine and select Power > Power Off.
3. Right-click the virtual machine, select Edit Settings.
4. From the Hardware list, select CPUs.
5. From the Number of virtual processors drop-down list, select the number of virtual processors
recommended for your XTMv edition.
Setup Guide 17
FireCluster on VMware ESXi
Configure Memory Resources
By default the XTMv virtual machine is allocated 1 GB of memory. For optimal performance, configure the
virtual machine to use the recommended memory resources for your XTMv edition.
To configure memory resources:
1. Launch the vSphere Client and log in to the ESXi host with administrator credentials.
2. In the vSphere Inventory tree, right-click the virtual machine and select Power > Power Off.
3. Right-click the virtual machine and select Edit Settings.
4. In the Hardware list, select Memory.
5. In the Memory Size text box, type or select the memory size recommended for your XTMv edition.
FireCluster on VMware ESXi
You can configure two XTMv virtual machines as a FireCluster. We recommend that you complete the virtual
network setup on the hypervisor before you configure the XTMv devices you want to cluster.
Plan the Cluster
Before you configure FireCluster, plan your network and configure the vSwitch for each interface.
Verify Basic Components
Make sure that you have these items:
Two WatchGuard XTMv virtual machines of the same type (Small Office, Medium Office, Large Office or
Datacenter Edition)
The same version of Fireware XTM on each device (Fireware XTM v11.8.1 or higher)
The feature key for each XTMv virtual machine
One vSwitch configured for each cluster interface
One vSwitch for each active traffic interface
WatchGuard System Manager v11.8.1 or higher, to edit the FireCluster configuration
Plan Your Network
Before you enable FireCluster, we recommend you identify the vSwitch, network interface, and network
addresses to use. For FireCluster, the external interface must use a static IP address. A clear plan helps you
configure the interface IP addresses, and configure the vSwitch settings as required for each interface. For
example, you could create a table that looks something like this:
vSwitch
name
XTM device
Interface #
IP address
Primary cluster interface HA-net 9 Member 1: 10.10.5.1/24
Member 2: 10.10.5.2/24
Interface for management
IP address
Trusted-net 1 Member 1: 10.10.1.2/24
Member 2: 10.10.1.3/24
External interface External-net 0 203.0.113.2 /24
Trusted interface Trusted-net 1 10.10.1.1/24
18 WatchGuard XTMv
FireCluster on VMware ESXi
Configure Network Switches
You must configure a vSwitch for each interface you want to enable. We recommend you do this before you
enable FireCluster. Before you enable FireCluster, make sure that the switches are configured to meet these
requirements:
The vSwitch for the external interface must be configured to accept MAC address changes
The vSwitch for the FireCluster management interface must have promiscuous mode enabled
The vSwitch that connects to each cluster interface must be dedicated to this purpose
For more information about switch configuration, see “Configure the Virtual Switch” on page 16.
Configure the Cluster
After you have planned your network and configured the vSwitches, you can set up the XTMv virtual machines
and enable FireCluster.
Deploy and Provision two XTMv Virtual Machines
To create a FireCluster with two new XTMv virtual machines, use the procedure in the previous section to
deploy and activate two XTMv devices. If you want to enable FireCluster for an existing XTMv virtual machine,
deploy and activate one additional XTMv virtual machine. For more information, see “XTMv Installation” on
page 6.
Allocate the same resources (network adapters, virtual CPU, and memory) to each XTMv virtual machine. For
more information, see “ESXi Resource Allocation” on page 15.
Get the Feature Key for the Second Device
Copy the feature key from the second device to a text file, so that you can add it to the FireCluster
configuration.
To copy the feature key with Policy Manager:
1. In WatchGuard System Manager, connect to the XTMv virtual machine that will be the second device
in the cluster.
2. Select Tools > Policy Manager.
3. Select Setup > Feature Keys > Details.
4. Select and copy the feature key details to a text file.
Configure FireCluster
The steps to configure FireCluster on XTMv are the same as for any other XTM device, except that you must
select active/passive for an XTMv FireCluster.
To configure the FireCluster:
1. In WatchGuard System Manager, connect to the XTMv virtual machine that has the configuration you
want to use for the cluster.
2. Select Tools > Policy Manager.
3. Select FireCluster > Setup.
The FireCluster Setup Wizard starts.
4. Click Next.
5. Select Active/Passive cluster.
Even though you can select it, the Active/Active cluster option is not supported for XTMv.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36

Watchguard XTMv Installation guide

Category
Networking
Type
Installation guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI